- Brief introduction
- Managing keys
- gpg key instead of ssh and gpg-agent instead of ssh-agent
- hardware tokens
- I’m not a security expert.
- We won’t learn how to use tools for encryption/signing/etc today.
aka Public-key cryptography.
- Sign the work (binaries, commits, tags)
- Encrypt (files, emails, passwords)
- Authenticate (SSH, Git, VPN)
- Create and sign other keys
https://rzetterberg.github.io/assets/yubikey-gpg-nixos/key-anatomy1.png
- Sign
- Encrypt
- Authenticate
- Certify
Do it in a safe environment.
gpg --expert --full-generate-key
gpg --edit-key
addkey
# Use encrypted flash drive or similiar tool instead of ~/gpg-backup dir
# For more information: https://github.com/drduh/YubiKey-Guide#backup
mkdir ~/gpg-backup
gpg --export-secret-keys > ~/gpg-backup/keys.gpg
gpg --export-secret-subkeys > ~/gpg-backup/subkeys.gpg
- keyserver
- web
- email/etc
gpg --keyserver keyserver.ubuntu.com --search-keys KEYID
https://wiki.archlinux.org/index.php/GnuPG#SSH_agent https://github.com/drduh/YubiKey-Guide#ssh